|
Challenge 1
Many high-profile companies have been the victim of malicious hacking events exposing the personal data of customers.
Produce a report on 2 high-profile cases, including:
|
|
|
Challenge 2
Examine the different risks faced by individuals and companies from component failure. Include examples of real-world mistakes resulting from poor backup practices.
Prepare a report comparing backup procedures. Note their complexity, cost and which methods you would recommend for individuals, small and large companies. |
|
|
Challenge 3
A company wants to send some private data to a client and has suggested using email.
Research the steps involved in sending an email, paying particular attention to privacy. Produce a report telling the company whether email is the correct tool for this task, providing alternatives, if appropriate. |
|
|
Challenge 4
Create a flowchart to describe how to convert a website URL to the address of the machine it is hosted on. Pay particular attention to IPv4 and IPv6 addresses.
Create a campaign (e.g. presentation, poster, video) to persuade a network administrator to convert from using IPv4 to IPv6. |
|
|
Challenge 5
Research hardware virtualisation and its impact on the IT industry.
Based on the current IT infrastructure in your centre, produce a report on how you would go about migrating to a virtualised solution. Include the risks, costs and benefits of such a move. |
|
|
|
|